-% move this to a fitting place. I don't see why it fits here inside of the begin figure env. ~~ AK

-%\epigraph{``[...] be conservative in what you do, be liberal in what

-%you accept from others.''}{-- The robustness priciple or "Postel's Law"\cite{rfc761}}

- \centering

- \includegraphics[width=0.9\textwidth]{neboltai.png}

- \caption*{Do not talk unencrypted}

- \label{fig:neboltai}

-\end{figure}

-

\begin{abstract}

\section*{Abstract}

-

-

-\vskip 2em

-

-\epigraph{``Unfortunately, the computer security and cryptology communities have drifted apart over the last 25 years. Security people don't always understand the available crypto tools, and crypto people don't always understand the real-world problems.``}{-- Ross Anderson in \cite{anderson2008security}}

-

-\vskip 2em

+\epigraph{``Unfortunately, the computer security and cryptology communities have drifted apart over the last 25 years. Security people don't always understand the available crypto tools, and crypto people don't always understand the real-world problems.''}{Ross Anderson in~\cite{anderson2008security}}

This guide arose out of the need for system administrators to have an

updated, solid, well researched and thought-through guide for configuring SSL,

@@ -25,44+9,39 @@ leaks in the summer of 2013, many system administrators and IT security

officers saw the need to strengthen their encryption settings.

This guide is specifically written for these system administrators.

-\vskip 0.5em

As Schneier noted in \cite{Sch13}, it seems that intelligence agencies and

adversaries on the Internet are not breaking so much the mathematics of

encryption per se, but rather use software and hardware weaknesses, subvert